198
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Nearly Optimal Change-Point Detection with an Application to Cybersecurity

, &
Pages 409-435 | Received 04 Oct 2011, Accepted 10 Mar 2012, Published online: 24 Jul 2012
 

Abstract

We address the sequential change-point detection problem for the Gaussian model where baseline distribution is Gaussian with variance σ2 and mean μ such that σ2 = aμ, where a > 0 is a known constant; the change is in μ from one known value to another. First, we carry out a comparative performance analysis of four detection procedures: the Cumulative Sum (CUSUM) procedure, the Shiryaev–Roberts (SR) procedure, and two its modifications—the Shiryaev–Roberts–Pollak and Shiryaev–Roberts–r procedures. The performance is benchmarked via Pollak's maximal average delay to detection and Shiryaev's stationary average delay to detection, each subject to a fixed average run length to false alarm. The analysis shows that in practically interesting cases the accuracy of asymptotic approximations is “reasonable” to “excellent”. We also consider an application of change-point detection to cybersecurity for rapid anomaly detection in computer networks. Using real network data we show that statistically traffic's intensity can be well described by the proposed Gaussian model with σ2 = aμ instead of the traditional Poisson model, which requires σ2 = μ. By successively devising the SR and CUSUM procedures to “catch” a low-contrast network anomaly (caused by an Internet Control Message Protocol reflector attack), we then show that the SR rule is quicker. We conclude that the SR procedure is a better cyber “watch dog” than the popular CUSUM procedure.

Subject Classifications:

ACKNOWLEDGMENTS

The work of Aleksey Polunchenko and Alexander Tartakovsky was supported by the U.S. Army Research Office under MURI grant W911NF-06-1-0044, by the U.S. Air Force Office of Scientific Research under MURI grant FA9550-10-1-0569, by the U.S. Defense Threat Reduction Agency under grant HDTRA1-10-1-0086, and by the U.S. National Science Foundation under grants CCF-0830419 and EFRI-1025043 at the University of Southern California, Department of Mathematics. We also thank Christos Papadopoulos of Colorado State University and John Heidemann of the Information Sciences Institute for providing real computer network data traces.

Notes

Recommended by T. K. S. Solanky.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.